Enhancing the RC4 Algorithm by Eliminating the Initiative Vector (IV) Transmission

Authors

  • Waleed Abdelrahman Yousif Mohammed Faculty of Computer Studies and Information Technology, Nile University, Khartoum, Sudan
  • Salmah Fattah Cybersecurity Research Lab, Faculty of Computing and Informatics, Universiti Malaysia Sabah, Jalan UMS, Kota Kinabalu, Malaysia
  • Khalid Mohammed Osman Saeed Faculty of Computer Science and Information Technology, Omdurman Islamic University, Sudan
  • Ashraf Osman Ibrahim Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Malaysia | Positive Computing Research Center, Emerging & Digital Technologies Institute, Universiti Teknologi PETRONAS, Seri Iskandar, Malaysia
  • Safaa Eltahier Software Engineering Department, College of Computer Engineering and Science, Prince Sattam Bin Abdulaziz University, KSA | Software Engineering Department, College of Computer Science and Information Technology, Sudan University of Science and Technology, Khartoum, Sudan
Volume: 15 | Issue: 1 | Pages: 20242-20248 | February 2025 | https://doi.org/10.48084/etasr.9208

Abstract

The Rivest Cipher RC4 encryption algorithm is commonly utilized to generate keys of varying lengths. Despite its rapid processing speed, vulnerabilities within the algorithm have made it susceptible to exploitation, allowing attackers to compromise it within a matter of minutes. This paper introduces an innovative approach to address the vulnerabilities of the RC4 encryption algorithm by employing an Initiative Vector (IV). The proposed method incorporates a lengthy random text without transmitting an initialization vector. The proposed solution was rigorously validated, demonstrating performance comparable to existing solutions while simultaneously expanding the range of potential solutions and mitigating security threats. Further exploration into the use of a complex equation is recommended for calculating the swapping value j while maintaining the same high level of performance.

Keywords:

encryption algorithm, file protection, cryptography, RC4, Initiative Vector (IV)

Downloads

Download data is not yet available.

References

M. Safaei Pour, C. Nader, K. Friday, and E. Bou-Harb, "A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security," Computers & Security, vol. 128, May 2023, Art. no. 103123.

H. N. Thakur, A. Al Hayajneh, K. Thakur, A. Kamruzzaman, and M. L. Ali, "A Comprehensive Review of Wireless Security Protocols and Encryption Applications," in 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, Jun. 2023, pp. 373–379.

C. Slamet, U. Syaripudin, F. M. Kaffah, and B. E. Tiasto, "Implementation of Rivest Cypher 4 algorithm in Security Assertion Mark-up Language protocols on Single Sign-On services," IOP Conference Series: Materials Science and Engineering, vol. 1098, no. 3, Mar. 2021, Art. no. 032109.

B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York: John Wiley & Sons Inc, 1996.

M. A. Alrammahi and H. Kaur, "Development of Advanced Encryption Standard (AES) Cryptography Algorithm for Wi-Fi Security Protocol," International Journal of Advanced Research in Computer Science, vol. 5, no. 3, pp. 62–67, 2014.

R. L. Rivest, "The RC5 encryption algorithm," in Fast Software Encryption, Leuven, Belgium, 1995, pp. 86–96.

K. Aggarwal, J. Kaur Saini, and H. K. Verma, "Performance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers," International Journal of Computer Applications, vol. 68, no. 25, pp. 10–16, Apr. 2013.

S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4," in Selected Areas in Cryptography, Toronto, Canada, 2001, pp. 1–24.

S. Paul and B. Preneel, "Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator," in Progress in Cryptology - INDOCRYPT 2003, New Delhi, India, 2003, pp. 52–67.

G. Paul and S. Maitra, RC4 Stream Cipher and Its Variants. CRC Press, 2011.

M. M. Hammood, K. Yoshigoe, and A. M. Sagheer, "Enhancing security and speed of RC4," International Journal of Computing and Network Technology, vol. 3, no. 2, 2015.

J. Xie and X. Pan, "An improved RC4 stream cipher," in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Taiyuan, China, Oct. 2010.

E. J. Madarro-Capó, C. M. Legón-Pérez, O. Rojas, and G. Sosa-Gómez, "Measuring Avalanche Properties on RC4 Stream Cipher Variants," Applied Sciences, vol. 11, no. 20, Oct. 2021, Art. no. 9646.

C. Sun et al., "A high-speed and low-latency hardware implementation of RC4 cryptographic algorithm," International Journal of Circuit Theory and Applications, vol. 51, no. 12, pp. 5980–5996, 2023.

S. Kareem and A. M. Rahma, "A Modification on Key Stream Generator for RC4 Algorithm," Engineering and Technology Journal, vol. 38, no. 2B, pp. 54–60, Jul. 2020.

A. F. Doni, O. A. H. Maria, and S. Hanif, "Implementation of RC4 Cryptography Algorithm for Data File Security," Journal of Physics: Conference Series, vol. 1569, no. 2, Jul. 2020, Art. no. 022080.

R. Saha, G. Geetha, G. Kumar, T.-H. Kim, and W. J. Buchanan, "MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features," IEEE Access, vol. 7, pp. 172045–172054, 2019.

S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, "Security of Internet of Things using RC4 and ECC Algorithms (Case Study: Smart Irrigation Systems)," Wireless Personal Communications, vol. 116, no. 3, pp. 1713–1742, Feb. 2021.

U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, "A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review," Sensors, vol. 23, no. 8, Jan. 2023, Art. no. 4117.

T. Guo, Y. Feng, and Y. Fu, "A new form of initialization vectors in the FMS attack of RC4 in WEP," Procedia Computer Science, vol. 183, pp. 456–461, Jan. 2021.

Z. A. Mohammed, H. Q. Gheni, Z. J. Hussein, and A. K. M. Al-Qurabat, "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques," Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12694–12701, Feb. 2024.

Downloads

How to Cite

[1]
Mohammed, W.A.Y., Fattah, S., Saeed, K.M.O., Ibrahim, A.O. and Eltahier, S. 2025. Enhancing the RC4 Algorithm by Eliminating the Initiative Vector (IV) Transmission. Engineering, Technology & Applied Science Research. 15, 1 (Feb. 2025), 20242–20248. DOI:https://doi.org/10.48084/etasr.9208.

Metrics

Abstract Views: 54
PDF Downloads: 43

Metrics Information